Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe
Resource
win10v2004-20220812-en
General
-
Target
af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe
-
Size
192KB
-
MD5
81c054cfa3d5967c0e3a9882d52dfe67
-
SHA1
28826e6635a4cdfe62e422044a78b8833a3999e0
-
SHA256
af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e
-
SHA512
ea54625a0be3674d885f2b16a2c6032127aebf4075021488210a9c7bafcb6dde9d0a8d5e3d40caa7c86a5575358b1eedc809b02048cb2eae90afa506323a3a3b
-
SSDEEP
1536:hgHABQruHlTTPRi4iti93MH9iV6MRfWzzp3BHReQbIYL2XoPLJB514R9/dJqi/7:C2QraTjRi4itiSHXzp3uYTPLJOhD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huieq.exe -
Executes dropped EXE 1 IoCs
pid Process 1108 huieq.exe -
Loads dropped DLL 2 IoCs
pid Process 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /q" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /d" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /n" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /t" huieq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /i" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /f" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /k" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /s" af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /b" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /p" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /c" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /y" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /a" huieq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /v" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /m" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /j" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /g" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /w" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /u" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /l" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /x" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /z" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /e" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /o" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /s" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /r" huieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\huieq = "C:\\Users\\Admin\\huieq.exe /h" huieq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe 1108 huieq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 1108 huieq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1108 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 28 PID 1112 wrote to memory of 1108 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 28 PID 1112 wrote to memory of 1108 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 28 PID 1112 wrote to memory of 1108 1112 af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe"C:\Users\Admin\AppData\Local\Temp\af986068a479d7756881ae42da0cd76931fb724c6bf42042bf55ac557d23d40e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\huieq.exe"C:\Users\Admin\huieq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD569bb764ecf2547586f48bc5cd42c4514
SHA151e2fea06a40d3fa25152155ab25a0ee351ea784
SHA25682882905f59cd86154fe7c30bd6e359e330e9a3335e51254bb3dd33ba8f2d96a
SHA51247bd40d147bf31720b8d07d7688bf17f31ded14de0f69aa5bb011d823472ea8504d16ef3159913038b0d4ef2f5314d0f7e5088ee08a40f419eaf539cc27cf1f9
-
Filesize
192KB
MD569bb764ecf2547586f48bc5cd42c4514
SHA151e2fea06a40d3fa25152155ab25a0ee351ea784
SHA25682882905f59cd86154fe7c30bd6e359e330e9a3335e51254bb3dd33ba8f2d96a
SHA51247bd40d147bf31720b8d07d7688bf17f31ded14de0f69aa5bb011d823472ea8504d16ef3159913038b0d4ef2f5314d0f7e5088ee08a40f419eaf539cc27cf1f9
-
Filesize
192KB
MD569bb764ecf2547586f48bc5cd42c4514
SHA151e2fea06a40d3fa25152155ab25a0ee351ea784
SHA25682882905f59cd86154fe7c30bd6e359e330e9a3335e51254bb3dd33ba8f2d96a
SHA51247bd40d147bf31720b8d07d7688bf17f31ded14de0f69aa5bb011d823472ea8504d16ef3159913038b0d4ef2f5314d0f7e5088ee08a40f419eaf539cc27cf1f9
-
Filesize
192KB
MD569bb764ecf2547586f48bc5cd42c4514
SHA151e2fea06a40d3fa25152155ab25a0ee351ea784
SHA25682882905f59cd86154fe7c30bd6e359e330e9a3335e51254bb3dd33ba8f2d96a
SHA51247bd40d147bf31720b8d07d7688bf17f31ded14de0f69aa5bb011d823472ea8504d16ef3159913038b0d4ef2f5314d0f7e5088ee08a40f419eaf539cc27cf1f9